Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defeating Program Analysis Techniques via Ambiguous Translation., , , , , and . ASE, page 1382-1387. IEEE, (2021)Adjust: runtime mitigation of resource abusing third-party online ads., , and . ICSE, page 1005-1015. IEEE / ACM, (2019)Protecting Semantic Trajectory Privacy for VANET with Reinforcement Learning., , , , and . ICC, page 1-5. IEEE, (2019)Automated WebAssembly Function Purpose Identification With Semantics-Aware Analysis., and . WWW, page 2885-2894. ACM, (2023)Birds Bring Flues? Mining Frequent and High Weighted Cliques from Birds Migration Networks., , , , , , , and . DASFAA (2), volume 5982 of Lecture Notes in Computer Science, page 359-369. Springer, (2010)Finding client-side business flow tampering vulnerabilities., , , , , , and . ICSE, page 222-233. ACM, (2020)An Empirical Analysis of UI-based Flaky Tests., , , , and . ICSE, page 1585-1597. IEEE, (2021)WASim: Understanding WebAssembly Applications through Classification., and . ASE, page 1321-1325. IEEE, (2020)Approximating Submodular k-Partition via Principal Partition Sequence., and . APPROX/RANDOM, volume 275 of LIPIcs, page 3:1-3:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)WEFix: Intelligent Automatic Generation of Explicit Waits for Efficient Web End-to-End Flaky Tests., , , , and . WWW, page 3043-3052. ACM, (2024)